write two tasks 1 email encryption amp 2 weak ig contributes to organizational issues with social media
The text mentions email encryption as an effective data security measure. After reviewing the information in the text:
a. Briefly describe email encryption in terms a non-technical business partner would understand.
b. Provide one example that would represent email encryption as a viable data security measure.
c. Provide one example that would represent email encryption as a business obstacle.
Be specific. Think critically. Cite and reference as appropriate. When discussing options with others, engage in conversation with pros, cons, and alternate solutions.
Knowing that weak IG contributes to organizational issues with social media, review the guiding IG principles discussed earlier in the class.
a. Choose 2 guiding principles. Briefly describe their connection to social media.
b. Propose 2 tactical solutions that align to the chosen guiding principles and will contribute to organizational social media risk mitigation.
Be specific. Be creative. Cite and reference as appropriate. When discussing options with others, offer your own ideas based on your knowledge and experience.